As you have just switched on your k.linux machine you must have found out hundreds of tools. Basically the tools are divided broadly into categories :
- Information Gathering
- Vulnerability Analysis
- Wireless Attacks
- Exploitation Tools
- Forensics Tools
- Stress Testing
- Sniffing and Spoofing
- Password Attacks
- Hardware Hacking
- Maintaining Access
- Reverse Engineering
- Reporting Tools
Information Gathering:
Information Gathering has a huge number of tools as i told you earlier it does 85% of job of the total attack mission.How ever the most common ones we will be using daily are:
- Recong-ng
- Wireshark
- SSl strip
- Nmap
- SET
- Dnsenum
Tools come with kali:
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Faraday
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- ident-user-enum
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- SPARTA
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
Vulnerability Analysis
This also a type of information gathering at some point actually it focuses on the type and nature of the vulnerability and auditing (a security check may not be acknowledge to employees and this is done by certified team to any organisation).
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- DBPwAudit
- Doona
- DotDotPwn
- HexorBase
- Inguma
- jSQL
- Lynis
- Nmap
- ohrwurm
- Oscanner
- Powerfuzzer
- sfuzz
- SidGuesser
- SIPArmyKnife
- sqlmap
- Sqlninja
- sqlsus
- THC-IPV6
- tnscmd10g
- unix-privesc-check
- Yersinia
Wireless Attacks
Its a part of Exlpoitation by these tools you can enter the network of any organisation through wireless interface(like wifi or bluetooth) and perform your wireless attacks through and breach into networks.Most popular one which can do the basic job for us are :
- Aircrack-ng
- coWpatty
- wifite
- wiifiphisher
- reaver
- pixiewps
- fernwifi cracker
- Bluesnarf
- Routersploit
Tools come with kali:
- Aircrack-ng
- Asleap
- Bluelog
- BlueMaho
- Bluepot
- BlueRanger
- Bluesnarfer
- Bully
- coWPAtty
- crackle
- eapmd5pass
- Fern Wifi Cracker
- Ghost Phisher
- GISKismet
- Gqrx
- gr-scan
- hostapd-wpe
- kalibrate-rtl
- KillerBee
- Kismet
- mdk3
- mfcuk
- mfoc
- mfterm
- Multimon-NG
- PixieWPS
- Reaver
- redfang
- RTLSDR Scanner
- Spooftooph
- Wifi Honey
- wifiphisher
- Wifitap
- Wifite
Exploitation Tools
These help in exploiting the vulnerabilities that are there in the system or network.Some of the famous ones are:
- Armitage
- Metasploit Framework
- BeEF framework
- ExplotDb
- SET
- Routersploit
- Armitage
- Backdoor Factory
- BeEF
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- Commix
- crackle
- exploitdb
- jboss-autopwn
- Linux Exploit Suggester
- Maltego Teeth
- Metasploit Framework
- RouterSploit
- SET
- ShellNoob
- sqlmap
- THC-IPV6
- Yersinia
Forensics Tools
These are used to extract information about some previous attacks and help in investigation of postattacks or even during attacks.
Web Applications
Basically web applications are nothing just the websites.These tools are used to trace vulnerability in website and also used to exploit website.There is whole new category of attacks that can be performed on websites that are categorised by OWASP they standardisedcthe attacks into 10 categories.The tools used for it are:
- apache-users
- Arachni
- BBQSQL
- BlindElephant
- Burp Suite
- CutyCapt
- DAVTest
- deblaze
- DIRB
- DirBuster
- fimap
- FunkLoad
- Gobuster
- Grabber
- jboss-autopwn
- joomscan
- jSQL
- Maltego Teeth
- PadBuster
- Paros
- Parsero
- plecost
- Powerfuzzer
- ProxyStrike
- Recon-ng
- Skipfish
- sqlmap
- Sqlninja
- sqlsus
- ua-tester
- Uniscan
- Vega
- w3af
- WebScarab
- Webshag
- WebSlayer
- WebSploit
- Wfuzz
- WPScan
- XSSer
- zaproxy
Stress Testing
These basically comprises DOS (DOS the site that ois Denial Of Service Attack performed to turn down the seerver by sending bogus requests) AND DDOS ATTACKS and attacks those are performed checks the how many number of requests a server or wesbite can withstand.The tools used for it are:
- DHCPig
- FunkLoad
- iaxflood
- Inundator
- inviteflood
- ipv6-toolkit
- mdk3
- Reaver
- rtpflood
- SlowHTTPTest
- t50
- Termineter
- THC-IPV6
- THC-SSL-DOS
Sniffing and Spoofing
Sniffing is actually stealing the transfering data and intercepting the traffic in the network.While spoofing is totally different it faking and inpersonation someone else identity to steal the sensitive data from the target.
- Burp Suite
- DNSChef
- fiked
- hamster-sidejack
- HexInject
- iaxflood
- inviteflood
- iSMTP
- isr-evilgrade
- mitmproxy
- ohrwurm
- protos-sip
- rebind
- responder
- rtpbreak
- rtpinsertsound
- rtpmixsound
- sctpscan
- SIPArmyKnife
- SIPp
- SIPVicious
- SniffJoke
- SSLsplit
- sslstrip
- THC-IPV6
- VoIPHopper
- WebScarab
- Wifi Honey
- Wireshark
- xspy
- Yersinia
- zaproxy
Password Cracking
What are password cracking tools ! these tools are used to sniff pssword or to break the hashes into credential password or even bruteforce it(bruteforcing is technique where the try the combination of letters and numbers to breake into )
- acccheck
- Burp Suite
- CeWL
- chntpw
- cisco-auditing-tool
- CmosPwd
- creddump
- crunch
- DBPwAudit
- findmyhash
- gpp-decrypt
- hash-identifier
- HexorBase
- THC-Hydra
- John the Ripper
- Johnny
- keimpx
- Maltego Teeth
- Maskprocessor
- multiforcer
- Ncrack
- oclgausscrack
- PACK
- patator
- phrasendrescher
- polenum
- RainbowCrack
- rcracki-mt
- RSMangler
- SQLdict
- Statsprocessor
- THC-pptp-bruter
- TrueCrack
- WebScarab
- wordlists
- zaproxy
Hardware Hacking
This is just my favourite section and mainly deals with arduino and rasberry pi or ther microcontrollers/microprocessors how to use them as portable and hacking device!IT also deals with android hacking
Maintaning Access
Okay now you breached in to thetarget system or network now how to maintain your access if one dont do this quicky he will be thrown out by the security services or softwares(anti-virus).So how to be safe nad until you complete your exloiting mission and clear your traces(this very very important).
- CryptCat
- Cymothoa
- dbd
- dns2tcp
- http-tunnel
- HTTPTunnel
- Intersect
- Nishang
- polenum
- PowerSploit
- pwnat
- RidEnum
- sbd
- U3-Pwn
- Webshells
- Weevely
- Winexe
Reverse Engineering
This might be the popular terms used it actually breaking the components to understnad it working the best example of reverse engineering is checking the machine code of the software and converting the trial software into pro version or full pain version.
Reporting Tools
The security audit report is the key deliverable in any security assessment activity. In Penetration testing, the final deliverable is the report which shows the service provided, the methodology used, findings/results and the recommendation. Many penetration testers find the report making as a boring process because it takes a lot of time and effort.
Hope it helped leave down the suggestions and follow for more posts!
